This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Steps to deploy a certificate fir User Portal

We've recently purchased an official wildcard certificate for our domain at DigiCert.
They actually do not provide a PKCS#12 File for download.

It's possible to create a copy of this certificate but I have to provide a certificate request .req file - then I receive a certificate as .cer file. This works well on MS Windows platforms in server applications like Exchange or IIS.

What I want to achieve is to have a valid+official certificate when users connect to the UserPortal. The WebAdmin should also use this certificate.

 It seems the Sophos certificate system works completely different and I'm not sure where to start. I'm also not highly experienced in handling certificate deployment.

Can you give me a hint?



This thread was automatically locked due to age.
Parents
  • I'm sure you can find instructions on converting a .cer file to a .crt file.  I found it easier to do the following with OpenSSL for Windows.  The input.key is the private key from when you did your CSR.

    Convert a .crt to a pkcs#12:

    First, convert the certificate from .crt to PEM:

    openssl x509 -in input.crt -inform CRT -out output.crt -outform PEM

    Next, use the openssl command to read the PEM encoded certificate(s) and key and export to a single PKCS#12 file as follows:

    openssl pkcs12 -export -in input.crt -inkey input.key -out bundle.p12

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Reply
  • I'm sure you can find instructions on converting a .cer file to a .crt file.  I found it easier to do the following with OpenSSL for Windows.  The input.key is the private key from when you did your CSR.

    Convert a .crt to a pkcs#12:

    First, convert the certificate from .crt to PEM:

    openssl x509 -in input.crt -inform CRT -out output.crt -outform PEM

    Next, use the openssl command to read the PEM encoded certificate(s) and key and export to a single PKCS#12 file as follows:

    openssl pkcs12 -export -in input.crt -inkey input.key -out bundle.p12

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
Children
No Data